Author of the publication

Mean Value-Based Power Allocation without Instantaneous CSI Feedback in Spectrum Sharing Systems.

, , , and . IEEE Trans. Wirel. Commun., 11 (3): 874-879 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and experiment of add-on track following controller for optical disc drives based on robust output regulation., , and . ACC, page 1829-1835. IEEE, (2004)On the Impact of Outdated Channel Information on the Capacity of Secondary User in Spectrum Sharing Environments., , , and . IEEE Trans. Wirel. Commun., 11 (1): 284-295 (2012)Mean Value-Based Power Allocation without Instantaneous CSI Feedback in Spectrum Sharing Systems., , , and . IEEE Trans. Wirel. Commun., 11 (3): 874-879 (2012)User reputation based VoIP spam defense architecture., , , , and . ICOIN, page 1-6. IEEE, (2009)Adaptive Add-On Output Regulator for Rejection of Sinusoidal Disturbances and Application to Optical Disc Drives., , and . IEEE Trans. Ind. Electron., 61 (10): 5490-5499 (2014)SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability., , , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 564-571. Springer, (2004)Performance Analysis of Wireless Dual-Hop Systems With Multirelay and Multiuser., , , , , and . PIMRC, page 1-5. IEEE, (2007)Simulation-Based Security Testing for Continuity of Essential Service., , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 567-576. Springer, (2004)Modeling of Distributed Intrusion Detection Using Fuzzy System., , and . ICIC (2), volume 4114 of Lecture Notes in Computer Science, page 165-170. Springer, (2006)System Specification Based Network Modeling for Survivability Testing Simulation.. ICISC, volume 2587 of Lecture Notes in Computer Science, page 90-106. Springer, (2002)